Griffith University

Displaying 1-11 of 11 results

The authors propose algorithms to synthesize the specifications modeling the capabilities of an agent, the environment they acts in, and the governing norms, into a process graph. This process graph corresponds to a collection of courses of action and represents all the licit alternatives the agent may choose to meet...

Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. In this paper, the authors propose the use of GSE methodology to analyze the incompleteness and uncertainties in specifications. The IEEE 802.11i security protocol...

This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-commerce implementation. The latest report released in 2010 by The Communications and...

ERP systems are the largest software applications adopted by universities, along with quite significant investments in their implementation. However, unlike other applications little research has been conducted regarding these systems in a university environment. This paper aims at providing a critical review of previous research in ERP system in higher...

Islamic finance is one of the most rapidly growing segments of the global financial system. However, despite the increasing importance of Islamic finance, particularly in developing economies in the Middle East and South-East Asia, religious and social complexity has acted against a fuller understanding by regulators, policymakers, researchers and practitioners....

Phishing is the use of fraudulent emails to obtain personal financial information from victims by posing as legitimate financial institutions or commerce sites. This exploratory paper involved interviewing 104 participants, 50 of whom reported having received a phishing email. The theoretical foundation for this research is routine activity theory, whereby...

Wireless networks are becoming ubiquitous and can be found in domestic, commercial, industrial, military, and healthcare applications. In these application areas network security assumes an increasingly important role because security breaches may result in the loss of human lives. This paper examines the problem of ensuring route integrity in multi-hop...

This paper uses an empirical case study methodology to examine the impact of trust within social networks on Thai SMEs' adoption of Electronic Commerce (EC). In particular, the paper examines the significance of dispositional and experiential trust between social network members on EC adoption. The findings suggest that dispositional trust...

Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper closely examines...

With the increased usage of Wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. In this paper, the authors investigate the integrity of the security model developed by them based on 802.11i Robust Security Network (RSN), strengthening their desire towards establishing a secure wireless...

Islamic finance is one of the most rapidly growing segments of the global financial system. However, despite the increasing importance of Islamic finance, particularly in developing economies in the Middle East and South-East Asia, religious and social complexity has acted against a fuller understanding by regulators, policymakers, researchers and practitioners....

Wireless networks are becoming ubiquitous and can be found in domestic, commercial, industrial, military, and healthcare applications. In these application areas network security assumes an increasingly important role because security breaches may result in the loss of human lives. This paper examines the problem of ensuring route integrity in multi-hop...

With the increased usage of Wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. In this paper, the authors investigate the integrity of the security model developed by them based on 802.11i Robust Security Network (RSN), strengthening their desire towards establishing a secure wireless...

Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. In this paper, the authors propose the use of GSE methodology to analyze the incompleteness and uncertainties in specifications. The IEEE 802.11i security protocol...

This paper uses an empirical case study methodology to examine the impact of trust within social networks on Thai SMEs' adoption of Electronic Commerce (EC). In particular, the paper examines the significance of dispositional and experiential trust between social network members on EC adoption. The findings suggest that dispositional trust...

ERP systems are the largest software applications adopted by universities, along with quite significant investments in their implementation. However, unlike other applications little research has been conducted regarding these systems in a university environment. This paper aims at providing a critical review of previous research in ERP system in higher...

This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-commerce implementation. The latest report released in 2010 by The Communications and...

The authors propose algorithms to synthesize the specifications modeling the capabilities of an agent, the environment they acts in, and the governing norms, into a process graph. This process graph corresponds to a collection of courses of action and represents all the licit alternatives the agent may choose to meet...

Wireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper closely examines...

Phishing is the use of fraudulent emails to obtain personal financial information from victims by posing as legitimate financial institutions or commerce sites. This exploratory paper involved interviewing 104 participants, 50 of whom reported having received a phishing email. The theoretical foundation for this research is routine activity theory, whereby...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?